Search Header Logo

SOF Day 1 Review

Authored by Justin Bauguess

Computers

Professional Development

Used 24+ times

SOF Day 1 Review
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What are some of the costs associated with a data breach? (Select more than one answer.)

Fines

Re-Training Employees

Reputation Damage

Nothing - Data Breaches don't cost anything

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are some signs a security operations organization is at ServiceNow's "Maturity Level 2"? (Multiple answers)

Automated querying of internal and supplier environments

Prioritization by impact

KPIs, Reporting, and SLAs

Noise Reduction

Easily handle common attacks to improve response closure

Answer explanation

Automated querying of internal and supplier environments is part of level 5 Easily handle common attacks to improve response closure is part of level 4.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False: It is better to add roles directly to a user rather than adding roles to a group and then users to the group.

True

False

Answer explanation

Adding roles to the group then users to that group prevents a user from keeping a role they should not have.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the scope prefix for Security Incident?

sn_sec_si

sn_sec_cmn

sn_vul

sn_si

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the scope prefix for Vulnerability Response?

sn_sec_vul

sn_vul

sn_si

sn_sec_cmn

6.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Which are features from Security Support Common (but can be used for other purposes)?

There are multiple answers.

Enrichment Data Mapping

Email Parsing

Escalations

Workflow Triggers

Filter Groups

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False. Vulnerable Items can only be part of one Remediation Task (Vulnerability Group).

True

False

Answer explanation

Vulnerable Items and Remediation Tasks (Vulnerability Groups) are related in the sn_vul_m2m_vul_group_item table.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?